Implementing Cisco IOS Network Security (IINS)
Home > Computing and Information Technology > Computer certification > Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Implementing Cisco IOS Network Security (IINS) is a Cisco-authorized, self-paced learning tool for CCNA® Security foundation learning. This book provides you with the knowledge needed to secure Cisco® routers and switches and their associated networks. By reading this book, you will gain a thorough understanding of how to troubleshoot and monitor network devices to maintain integrity, confidentiality, and availability of data and devices, as well as the technologies that Cisco uses in its security infrastructure.   This book focuses on the necessity of a comprehensive security policy and how it affects the posture of the network. You will learn how to perform basic tasks to secure a small branch type office network using Cisco IOS® security features available through the Cisco Router and Security Device Manager (SDM) web-based graphical user interface (GUI) and through the command-line interface (CLI) on Cisco routers and switches. The author also provides, when appropriate, parallels with Cisco ASA appliances.   Whether you are preparing for CCNA Security certification or simply want to gain a better understanding of Cisco IOS security fundamentals, you will benefit from the information provided in this book.   Implementing Cisco IOS Network Security (IINS) is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Develop a comprehensive network security policy to counter threats against information security Configure routers on the network perimeter with Cisco IOS Software security features Configure firewall features including ACLs and Cisco IOS zone-based policy firewalls to perform basic security operations on a network Configure site-to-site VPNs using Cisco IOS features Configure IPS on Cisco network routers Configure LAN devices to control access, resist attacks, shield other network devices and systems, and protect the integrity and confidentiality of network traffic   This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed self-study solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.   

Table of Contents:
&n> Chapter 1 Introduction to Network Security Principles Examining Network Security Fundamentals     The Need for Network Security     Network Security Objectives     Data Classification     Security Controls     Response to a Security Breach     Laws and Ethics Examining Network Attack Methodologies     Adversaries, Motivations, and Classes of Attack     Classes of Attack and Methodology The Principles of Defense in Depth     IP Spoofing Attacks     Confidentiality Attacks     Integrity Attacks     Availability Attacks     Best Practices to Defeat Network Attacks Examining Operations Security     Secure Network Life Cycle Management     Principles of Operations Security     Network Security Testing     Disaster Recovery and Business Continuity Planning Understanding and Developing a Comprehensive Network Security Policy     Security Policy Overview     Security Policy Components     Standards, Guidelines, and Procedures     Security Policy Roles and Responsibilities     Risk Analysis and Management     Principles of Secure Network Design     Security Awareness Cisco Self-Defending Networks     Changing Threats and Challenges     Building a Cisco Self-Defending Network     Cisco Integrated Security Portfolio Summary     References Review Questions   Chapter 2 Perimeter Security Securing Administrative Access to Cisco Routers     General Router Security Guidelines     Introduction to the Cisco Integrated Services Router Family     Configuring Secure Administration Access     Configuring Multiple Privilege Levels     Configuring Role-Based Command-Line Interface Access Securing the Cisco IOS Image and Configuration Files Configuring Enhanced Support for Virtual Logins     Delays Between Successive Login Attempts     Login Shutdown if DoS Attacks Are Suspected     Generation of System Logging Messages for Login Detection     Configuring Banner Messages     Introducing Cisco SDM     Supporting Cisco SDM and Cisco SDM Express     Launching Cisco SDM Express     Launching Cisco SDM     Navigating the Cisco SDM Interface     Cisco SDM Wizards in Configure Mode Configuring AAA on a Cisco Router Using the Local Database     Authentication, Authorization, and Accounting     Introduction to AAA for Cisco Routers     Using Local Services to Authenticate Router Access Configuring AAA on a Cisco Router to Use Cisco Secure ACS     Cisco Secure ACS Overview     TACACS+ and RADIUS Protocols     Installing Cisco Secure ACS for Windows     Configuring the Server     Configuring TACACS+ Support on a Cisco Router     Troubleshooting TACACS+ Implementing Secure Management and Reporting     Planning Considerations for Secure Management and Reporting     Secure Management and Reporting Architecture     Using Syslog Logging for Network Security     Using Logs to Monitor Network Security     Using SNMP to Manage Network Devices     Configuring an SSH Daemon for Secure Management and Reporting     Enabling Time Features Locking Down the Router     Vulnerable Router Services and Interfaces     Management Service Vulnerabilities     Performing a Security Audit     Cisco AutoSecure Chapter Summary     References Review Questions   Chapter 3 Network Security Using Cisco IOS Firewalls Introducing Firewall Technologies     Firewall Fundamentals     Firewalls in a Layered Defense Strategy     Static Packet-Filtering Firewalls     Application Layer Gateways     Dynamic or Stateful Packet-Filtering Firewalls     Other Types of Firewalls     Cisco Family of Firewalls     Developing an Effective Firewall Policy     ACL Fundamentals     ACL Wildcard Masking     Using ACLs to Control Traffic     ACL Considerations     Configuring ACLs Using SDM     Using ACLs to Permit and Deny Network Services Configuring a Cisco IOS Zone-Based Policy Firewall     Zone-Based Policy Firewall Overview     Configuring Zone-Based Policy Firewalls Using the Basic Firewall Wizard     Manually Configuring Zone-Based Policy Firewalls Using Cisco SDM Monitoring a Zone-Based-Firewall Summary     References Review Questions   Chapter 4 Fundamentals of Cryptography Examining Cryptographic Services     Cryptology Overview     Symmetric and Asymmetric Encryption Algorithms     Block and Stream Ciphers     Encryption Algorithm Selection     Cryptographic Hashes     Key Management     Introducing SSL VPNs Examining Symmetric Encryption     Symmetric Encryption Overview     DES: Features and Functions     3DES: Features and Functions     AES: Features and Functions     SEAL: Features and Functions     Rivest Ciphers: Features and Functions Examining Cryptographic Hashes and Digital Signatures     Overview of Hash Algorithms     Overview of Hashed Message Authentication Codes     MD5: Features and Functions     SHA-1: Features and Functions     Overview of Digital Signatures     DSS: Features and Functions Examining Asymmetric Encryption and PKI     Asymmetric Encryption Overview     RSA: Features and Functions     DH: Features and Functions     PKI Definitions and Algorithms     PKI Standards     Certificate Authorities Summary     References Review Questions   Chapter 5 Site-to-Site VPNs VPN Overview     VPN Types     Cisco VPN Product Family Introducing IPsec     Encryption Algorithms     Diffie-Hellman Exchange     Data Integrity     Authentication     IPsec Advantages IPsec Protocol Framework     Authentication Header     Encapsulating Security Payload     Tunnel Mode Versus Transport Mode     IPsec Framework IKE Protocol     IKE Phase 1     IKE Phase 1: Example     IKE Phase 2 Building a Site-to-Site IPsec VPN     Site-to-Site IPsec VPN Operations     Configuring IPsec     Verifying the IPsec Configuration Configuring IPsec on a Site-to-Site VPN Using Cisco SDM     Introducing the Cisco SDM VPN Wizard Interface     Site-to-Site VPN Components     Using the Cisco SDM Wizards to Configure Site-to-Site VPNs     Completing the Configuration Summary     References Review Questions   Chapter 6 Network Security Using Cisco IOS IPS Introducing IDS and IPS     Types of IDS and IPS Systems     IPS Actions     Event Monitoring and Management Cisco IPS Management Software     Cisco Router and Security Device Manager     Cisco Security Monitoring, Analysis, and Response System     Cisco IDS Event Viewer     Cisco Security Manager     Cisco IPS Device Manager Host and Network IPS     Host-Based IPS     Network-Based IPS     Comparing HIPS and Network IPS Introducing Cisco IPS Appliances     Cisco IPS 4200 Series Sensors     Cisco ASA AIP SSM     Cisco Catalyst 6500 Series IDSM-2     Cisco IPS AIM Signatures and Signature Engines     Examining Signature Micro-Engines     Signature Alarms IPS Best Practices Configuring Cisco IOS IPS     Cisco IOS IPS Features     Configuring Cisco IOS IPS Using Cisco SDM     Configuring Cisco IOS IPS Using CLI     Configuring IPS Signatures     Monitoring IOS IPS Verifying IPS Operation Summary     References Review Questions   Chapter 7 LAN, SAN, Voice, and Endpoint Security Overview Examining Endpoint Security     Operating System Vulnerabilities     Application Vulnerabilities     Buffer Overflows     IronPort     Cisco NAC Products     Cisco Security Agent     Endpoint Security Best Practices Examining SAN Security     Defining SANs     SAN Fundamentals     SAN Security Scope Examining Voice Security     VoIP Fundamentals     Voice Security Threats     Defending Against VoIP Hacking Mitigating Layer 2 Attacks     Basic Switch Operation     Mitigating VLAN Attacks     Preventing Spanning Tree Protocol Manipulation     CAM Table Overflow Attacks     MAC Address Spoofing Attacks     Using Port Security     Additional Switch Security Features     Layer 2 Best Practices Summary     References Review Questions   Appendix Answers to Chapter Review Questions   Index

About the Author :
Catherine Paquet is a practitioner in the field of internetworking, network security, and security financials. She has authored or contributed to eight books thus far with Cisco Press. Catherine has in-depth knowledge of security systems, remote access, and routing technology. She is a Cisco Certified Security Professional (CCSP) and a Cisco Certified Network Professional (CCNP). Catherine is also a certified Cisco instructor with Cisco’s largest training partner, Global Knowledge, Inc. She also works on IT security projects for different organizations on a part-time basis. Following her university graduation from the Collège Militaire Royal de St-Jean (Canada), she worked as a system analyst, LAN manager, MAN manager, and eventually as a WAN manager. In 1994, she received a master’s degree in business administration (MBA) with a specialty in management information systems (MIS) from York University. Recently, she has been presenting a seminar on behalf of Cisco Systems (Emerging Markets) on the topic of the business case for network security in 22 countries. In 2002 and 2003, Catherine volunteered with the U.N. mission in Kabul, Afghanistan, to train Afghan public servants in the area of networking. Catherine lives in Toronto with her husband. They have two children, who are both attending university.


Best Sellers


Product Details
  • ISBN-13: 9781587058837
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Sub Title: (CCNA Security exam 640-553) (Authorized Self-Study Guide)
  • ISBN-10: 1587058839
  • Publisher Date: 14 Apr 2009
  • Binding: Digital download
  • No of Pages: 624


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)
Pearson Education (US) -
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!